ID脅威の予防、検出、対応(ITDR)。
ランサムウェアからのAD災害復旧。
ハイブリッド環境における統合エンドポイント管理。
ハイブリッドクラウド環境のエンタープライズバックアップ。
エンタープライズ・データ・モデリングとデータインテリジェンス。
多様な環境におけるデータベースのパフォーマンス管理。
データベースの管理と自動化
オンプレミスとクラウドにおける異機種混在のデータベースレプリケーション。
AD、Entra ID、Microsoft 365テナントの移行。
オンプレミスのAD統合と再構築。
SharePointとMicrosoft 365のコンテンツとファイルの移行。
Enterprise VaultとSourceOneメールアーカイブの移行。
統合されたID脅威の検出と対応(ITDR)機能を備えたハイブリッドADセキュリティ。
1週間または1ヶ月という長い時間をかけずに、数分、長くても数時間で業務、データ整合性そしてお客様からの信頼を復元します
データ運用、データ保護、およびデータのガバナンスを目的として、企業関係者がデータ資産を戦略的に使用できるようにします
すべてのシステム、アプリケーションおよびデータの保護とリカバリを行いながら、バックアップストレージのコストも削減します
ID中心のサイバーセキュリティを実現して、ビジネスに不可欠な人員、アプリケーション、およびデータを保護します
ユーザにとっては何事もなかったかのように、(今後すべての)次なる移行を達成します
進化するハイブリッドな作業環境を発見し、管理して、保護します
攻撃パスの管理、脅威の検知、およびディザスタリカバリでリスクを軽減します
ID脅威の検出および対応(ITDR)プロトコルに準拠したセキュリティソリューションで組織を守りましょう。
The Experts Conference (TEC) 2020 was a huge success. Our Office 365 learning track sessions were informative, in-depth and practical – and you can experience all of them on-demand, down below!
Teams Adoption can quickly get out of control. In this session, we'll cover best practices and proven techniques on settings, configuration, and customer implementations of Microsoft Teams. We'll explore governance techniques and tactics that work to handle archiving, provisioning, lifecycle management, and successful deployment.
With email being the world’s No. 1 most common exploitation method, system administrators and architects need to understand the scope of the problem. In this session, we will examine the fundamental reasons why email is such a problem in the current security landscape, common exploit methods within cloud or hybrid environments, and what we can do within Office 365 to help protect ourselves and the organizations for which we work.
Before you can use sensitivity labels effectively, you should understand the good and bad points of the technology and build a plan that works for your organization. Following this session, you’ll understand how sensitivity labels work, their relationship with Azure Information Protection and Office 365 apps (including SharePoint Online), and what needs to be done to build a deployment plan.
In this session, we’ll do a deep dive on configuration mistakes that can lead to more attacks, and how you can investigate how you are getting attacked to better protect yourself. We’ll also showcase the CIsecurity.org Office 365 benchmarks and showcase how you compare to best practice recommendations.
In this session, learn how to use the form control, along with many pro tips, such as common form logic functions and curb appeal. You’ll also see Laura Rogers build a Power Apps form in a live demo of a travel request form, which will include examples of form logic, such as showing and hiding fields per data conditions, pre-populating user information fields, and dynamic controls and validation.
Recent “stay-at-home” orders enforced around the world have accelerated the adoption of Teams, and it is easy to make common mistakes that leave exposures and security holes. In this session Quest Software’s Microsoft MVP and Teams expert Curtis Johnstone (MVP) will discuss Teams deployment considerations which affect the security and safe keeping of valuable organizational data in Teams.
Microsoft Cloud App Security (MCAS) is a hugely powerful tool that not only alerts you to bad activity, but also allows you to control what happens next. In this session, we’ll explore MCAS in depth with live demo. Using policies we’ll create here we can manage attacks, use behavior issues and more. I’ll also show how to create MCAS policies from your activity logs, which results in better security and alerting on what’s important to you.
登録する前に、出席したいWebキャストを選択してください。
お待ちください...